CVE-2023-53967

Screen SFT DAB 600/C firmware 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without requiring the current credentials. Attackers can exploit the userManager.cgx API endpoint by sending a crafted POST request with a new MD5-hashed password to directly modify the admin account's authentication.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*

History

26 Dec 2025, 16:50

Type Values Removed Values Added
CPE cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*
First Time Dbbroadcast
Dbbroadcast sft Dab 600\/c Firmware
Dbbroadcast sft Dab 600\/c
References () https://www.dbbroadcast.com - () https://www.dbbroadcast.com - Product
References () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - Product
References () https://www.exploit-db.com/exploits/51458 - () https://www.exploit-db.com/exploits/51458 - Exploit
References () https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-admin-password-change - () https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-admin-password-change - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php - Exploit, Third Party Advisory

22 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-22 22:16

Updated : 2025-12-26 16:50


NVD link : CVE-2023-53967

Mitre link : CVE-2023-53967

CVE.ORG link : CVE-2023-53967


JSON object : View

Products Affected

dbbroadcast

  • sft_dab_600\/c
  • sft_dab_600\/c_firmware
CWE
CWE-306

Missing Authentication for Critical Function